FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets

Hardware Oriented Security and Trust(2015)

引用 22|浏览1
暂无评分
摘要
Hardware Trojans compromise security by invalidating the assumption that hardware provides a root-of-trust for secure systems. We propose a novel approach for an FPGA system-on-chip (SoC) to ensure confidentiality of trusted software despite hardware Trojan attacks. Our approach employs defensive techniques that feature morphing on-chip resources for moving target defense against fabrication-time Trojans, onion-encryption for confidentiality, and replication of functionally-equivalent variants of processing elements with arbitrated voting for resilience to design-time Trojans. These techniques are enabled by partial runtime reconfiguration (PRR) and are managed by a hardware abstraction layer (HAL) that reduces developer burden. We call our approach the Morph Onion-encryption Replication PRR HAL, or MORPH. MORPH aims to provide a stable interface for embedded systems developers to use in deploying applications that are resilient to hardware Trojans.
更多
查看译文
关键词
cryptography,embedded systems,field programmable gate arrays,system-on-chip,trusted computing,FPGA SoC architecture,HAL,MORPH,PRR,arbitrated voting,design-time Trojans,embedded systems developers,fabrication-time trojans,hardware abstraction layer,hardware trojans,morph onion-encryption replication PRR HAL,on-chip resource morphing,partial runtime reconfiguration,root-of-trust,secret leaking,secure systems,system-on-chip,trusted software
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要